LocalCertService.cpp 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502
  1. /* This Source Code Form is subject to the terms of the Mozilla Public
  2. * License, v. 2.0. If a copy of the MPL was not distributed with this
  3. * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
  4. #include "LocalCertService.h"
  5. #include "CryptoTask.h"
  6. #include "ScopedNSSTypes.h"
  7. #include "cert.h"
  8. #include "mozilla/Casting.h"
  9. #include "mozilla/ModuleUtils.h"
  10. #include "mozilla/RefPtr.h"
  11. #include "nsIPK11Token.h"
  12. #include "nsIPK11TokenDB.h"
  13. #include "nsIX509Cert.h"
  14. #include "nsIX509CertDB.h"
  15. #include "nsIX509CertValidity.h"
  16. #include "nsLiteralString.h"
  17. #include "nsProxyRelease.h"
  18. #include "nsServiceManagerUtils.h"
  19. #include "nsString.h"
  20. #include "pk11pub.h"
  21. namespace mozilla {
  22. class LocalCertTask : public CryptoTask
  23. {
  24. protected:
  25. explicit LocalCertTask(const nsACString& aNickname)
  26. : mNickname(aNickname)
  27. {
  28. }
  29. nsresult RemoveExisting()
  30. {
  31. // Search for any existing certs with this name and remove them
  32. nsresult rv;
  33. for (;;) {
  34. UniqueCERTCertificate cert(
  35. PK11_FindCertFromNickname(mNickname.get(), nullptr));
  36. if (!cert) {
  37. return NS_OK; // All done
  38. }
  39. // Found a cert, check if generated by this service
  40. if (!cert->isRoot) {
  41. return NS_ERROR_UNEXPECTED; // Should be self-signed
  42. }
  43. NS_NAMED_LITERAL_CSTRING(commonNamePrefix, "CN=");
  44. nsAutoCString subjectNameFromNickname(commonNamePrefix + mNickname);
  45. if (!subjectNameFromNickname.Equals(cert->subjectName)) {
  46. return NS_ERROR_UNEXPECTED; // Subject should match nickname
  47. }
  48. if (!subjectNameFromNickname.Equals(cert->issuerName)) {
  49. return NS_ERROR_UNEXPECTED; // Issuer should match nickname
  50. }
  51. rv = MapSECStatus(PK11_DeleteTokenCertAndKey(cert.get(), nullptr));
  52. if (NS_FAILED(rv)) {
  53. return rv; // Some error, abort the loop
  54. }
  55. }
  56. }
  57. nsCString mNickname;
  58. };
  59. class LocalCertGetTask final : public LocalCertTask
  60. {
  61. public:
  62. LocalCertGetTask(const nsACString& aNickname,
  63. nsILocalCertGetCallback* aCallback)
  64. : LocalCertTask(aNickname)
  65. , mCallback(new nsMainThreadPtrHolder<nsILocalCertGetCallback>(aCallback))
  66. , mCert(nullptr)
  67. {
  68. }
  69. private:
  70. virtual nsresult CalculateResult() override
  71. {
  72. // Try to lookup an existing cert in the DB
  73. nsresult rv = GetFromDB();
  74. // Make a new one if getting fails
  75. if (NS_FAILED(rv)) {
  76. rv = Generate();
  77. }
  78. // If generation fails, we're out of luck
  79. if (NS_FAILED(rv)) {
  80. return rv;
  81. }
  82. // Validate cert, make a new one if it fails
  83. rv = Validate();
  84. if (NS_FAILED(rv)) {
  85. rv = Generate();
  86. }
  87. // If generation fails, we're out of luck
  88. if (NS_FAILED(rv)) {
  89. return rv;
  90. }
  91. return NS_OK;
  92. }
  93. nsresult Generate()
  94. {
  95. nsresult rv;
  96. // Get the key slot for generation later
  97. UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
  98. if (!slot) {
  99. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  100. }
  101. // Remove existing certs with this name (if any)
  102. rv = RemoveExisting();
  103. if (NS_FAILED(rv)) {
  104. return rv;
  105. }
  106. // Generate a new cert
  107. NS_NAMED_LITERAL_CSTRING(commonNamePrefix, "CN=");
  108. nsAutoCString subjectNameStr(commonNamePrefix + mNickname);
  109. UniqueCERTName subjectName(CERT_AsciiToName(subjectNameStr.get()));
  110. if (!subjectName) {
  111. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  112. }
  113. // Use the well-known NIST P-256 curve
  114. SECOidData* curveOidData = SECOID_FindOIDByTag(SEC_OID_SECG_EC_SECP256R1);
  115. if (!curveOidData) {
  116. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  117. }
  118. // Get key params from the curve
  119. ScopedAutoSECItem keyParams(2 + curveOidData->oid.len);
  120. keyParams.data[0] = SEC_ASN1_OBJECT_ID;
  121. keyParams.data[1] = curveOidData->oid.len;
  122. memcpy(keyParams.data + 2, curveOidData->oid.data, curveOidData->oid.len);
  123. // Generate cert key pair
  124. SECKEYPublicKey* tempPublicKey;
  125. UniqueSECKEYPrivateKey privateKey(
  126. PK11_GenerateKeyPair(slot.get(), CKM_EC_KEY_PAIR_GEN, &keyParams,
  127. &tempPublicKey, true /* token */,
  128. true /* sensitive */, nullptr));
  129. UniqueSECKEYPublicKey publicKey(tempPublicKey);
  130. tempPublicKey = nullptr;
  131. if (!privateKey || !publicKey) {
  132. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  133. }
  134. // Create subject public key info and cert request
  135. UniqueCERTSubjectPublicKeyInfo spki(
  136. SECKEY_CreateSubjectPublicKeyInfo(publicKey.get()));
  137. if (!spki) {
  138. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  139. }
  140. UniqueCERTCertificateRequest certRequest(
  141. CERT_CreateCertificateRequest(subjectName.get(), spki.get(), nullptr));
  142. if (!certRequest) {
  143. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  144. }
  145. // Valid from one day before to 1 year after
  146. static const PRTime oneDay = PRTime(PR_USEC_PER_SEC)
  147. * PRTime(60) // sec
  148. * PRTime(60) // min
  149. * PRTime(24); // hours
  150. PRTime now = PR_Now();
  151. PRTime notBefore = now - oneDay;
  152. PRTime notAfter = now + (PRTime(365) * oneDay);
  153. UniqueCERTValidity validity(CERT_CreateValidity(notBefore, notAfter));
  154. if (!validity) {
  155. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  156. }
  157. // Generate random serial
  158. unsigned long serial;
  159. // This serial in principle could collide, but it's unlikely
  160. rv = MapSECStatus(PK11_GenerateRandomOnSlot(
  161. slot.get(), BitwiseCast<unsigned char*, unsigned long*>(&serial),
  162. sizeof(serial)));
  163. if (NS_FAILED(rv)) {
  164. return rv;
  165. }
  166. // Create the cert from these pieces
  167. UniqueCERTCertificate cert(
  168. CERT_CreateCertificate(serial, subjectName.get(), validity.get(),
  169. certRequest.get()));
  170. if (!cert) {
  171. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  172. }
  173. // Update the cert version to X509v3
  174. if (!cert->version.data) {
  175. return NS_ERROR_INVALID_POINTER;
  176. }
  177. *(cert->version.data) = SEC_CERTIFICATE_VERSION_3;
  178. cert->version.len = 1;
  179. // Set cert signature algorithm
  180. PLArenaPool* arena = cert->arena;
  181. if (!arena) {
  182. return NS_ERROR_INVALID_POINTER;
  183. }
  184. rv = MapSECStatus(
  185. SECOID_SetAlgorithmID(arena, &cert->signature,
  186. SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE, 0));
  187. if (NS_FAILED(rv)) {
  188. return rv;
  189. }
  190. // Encode and self-sign the cert
  191. UniqueSECItem certDER(
  192. SEC_ASN1EncodeItem(nullptr, nullptr, cert.get(),
  193. SEC_ASN1_GET(CERT_CertificateTemplate)));
  194. if (!certDER) {
  195. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  196. }
  197. rv = MapSECStatus(
  198. SEC_DerSignData(arena, &cert->derCert, certDER->data, certDER->len,
  199. privateKey.get(),
  200. SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE));
  201. if (NS_FAILED(rv)) {
  202. return rv;
  203. }
  204. // Create a CERTCertificate from the signed data
  205. UniqueCERTCertificate certFromDER(
  206. CERT_NewTempCertificate(CERT_GetDefaultCertDB(), &cert->derCert, nullptr,
  207. true /* perm */, true /* copyDER */));
  208. if (!certFromDER) {
  209. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  210. }
  211. // Save the cert in the DB
  212. rv = MapSECStatus(PK11_ImportCert(slot.get(), certFromDER.get(),
  213. CK_INVALID_HANDLE, mNickname.get(),
  214. false /* unused */));
  215. if (NS_FAILED(rv)) {
  216. return rv;
  217. }
  218. // We should now have cert in the DB, read it back in nsIX509Cert form
  219. return GetFromDB();
  220. }
  221. nsresult GetFromDB()
  222. {
  223. nsCOMPtr<nsIX509CertDB> certDB = do_GetService(NS_X509CERTDB_CONTRACTID);
  224. if (!certDB) {
  225. return NS_ERROR_FAILURE;
  226. }
  227. nsCOMPtr<nsIX509Cert> certFromDB;
  228. nsresult rv;
  229. rv = certDB->FindCertByNickname(NS_ConvertASCIItoUTF16(mNickname),
  230. getter_AddRefs(certFromDB));
  231. if (NS_FAILED(rv)) {
  232. return rv;
  233. }
  234. mCert = certFromDB;
  235. return NS_OK;
  236. }
  237. nsresult Validate()
  238. {
  239. // Verify cert is self-signed
  240. bool selfSigned;
  241. nsresult rv = mCert->GetIsSelfSigned(&selfSigned);
  242. if (NS_FAILED(rv)) {
  243. return rv;
  244. }
  245. if (!selfSigned) {
  246. return NS_ERROR_FAILURE;
  247. }
  248. // Check that subject and issuer match nickname
  249. nsXPIDLString subjectName;
  250. nsXPIDLString issuerName;
  251. mCert->GetSubjectName(subjectName);
  252. mCert->GetIssuerName(issuerName);
  253. if (!subjectName.Equals(issuerName)) {
  254. return NS_ERROR_FAILURE;
  255. }
  256. NS_NAMED_LITERAL_STRING(commonNamePrefix, "CN=");
  257. nsAutoString subjectNameFromNickname(
  258. commonNamePrefix + NS_ConvertASCIItoUTF16(mNickname));
  259. if (!subjectName.Equals(subjectNameFromNickname)) {
  260. return NS_ERROR_FAILURE;
  261. }
  262. nsCOMPtr<nsIX509CertValidity> validity;
  263. mCert->GetValidity(getter_AddRefs(validity));
  264. PRTime notBefore, notAfter;
  265. validity->GetNotBefore(&notBefore);
  266. validity->GetNotAfter(&notAfter);
  267. // Ensure cert will last at least one more day
  268. static const PRTime oneDay = PRTime(PR_USEC_PER_SEC)
  269. * PRTime(60) // sec
  270. * PRTime(60) // min
  271. * PRTime(24); // hours
  272. PRTime now = PR_Now();
  273. if (notBefore > now ||
  274. notAfter < (now - oneDay)) {
  275. return NS_ERROR_FAILURE;
  276. }
  277. return NS_OK;
  278. }
  279. virtual void ReleaseNSSResources() override {}
  280. virtual void CallCallback(nsresult rv) override
  281. {
  282. (void) mCallback->HandleCert(mCert, rv);
  283. }
  284. nsMainThreadPtrHandle<nsILocalCertGetCallback> mCallback;
  285. nsCOMPtr<nsIX509Cert> mCert; // out
  286. };
  287. class LocalCertRemoveTask final : public LocalCertTask
  288. {
  289. public:
  290. LocalCertRemoveTask(const nsACString& aNickname,
  291. nsILocalCertCallback* aCallback)
  292. : LocalCertTask(aNickname)
  293. , mCallback(new nsMainThreadPtrHolder<nsILocalCertCallback>(aCallback))
  294. {
  295. }
  296. private:
  297. virtual nsresult CalculateResult() override
  298. {
  299. return RemoveExisting();
  300. }
  301. virtual void ReleaseNSSResources() override {}
  302. virtual void CallCallback(nsresult rv) override
  303. {
  304. (void) mCallback->HandleResult(rv);
  305. }
  306. nsMainThreadPtrHandle<nsILocalCertCallback> mCallback;
  307. };
  308. NS_IMPL_ISUPPORTS(LocalCertService, nsILocalCertService)
  309. LocalCertService::LocalCertService()
  310. {
  311. }
  312. LocalCertService::~LocalCertService()
  313. {
  314. }
  315. nsresult
  316. LocalCertService::LoginToKeySlot()
  317. {
  318. nsresult rv;
  319. // Get access to key slot
  320. UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
  321. if (!slot) {
  322. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  323. }
  324. // If no user password yet, set it an empty one
  325. if (PK11_NeedUserInit(slot.get())) {
  326. rv = MapSECStatus(PK11_InitPin(slot.get(), "", ""));
  327. if (NS_FAILED(rv)) {
  328. return rv;
  329. }
  330. }
  331. // If user has a password set, prompt to login
  332. if (PK11_NeedLogin(slot.get()) && !PK11_IsLoggedIn(slot.get(), nullptr)) {
  333. // Switching to XPCOM to get the UI prompt that PSM owns
  334. nsCOMPtr<nsIPK11TokenDB> tokenDB =
  335. do_GetService(NS_PK11TOKENDB_CONTRACTID);
  336. if (!tokenDB) {
  337. return NS_ERROR_FAILURE;
  338. }
  339. nsCOMPtr<nsIPK11Token> keyToken;
  340. tokenDB->GetInternalKeyToken(getter_AddRefs(keyToken));
  341. if (!keyToken) {
  342. return NS_ERROR_FAILURE;
  343. }
  344. // Prompt the user to login
  345. return keyToken->Login(false /* force */);
  346. }
  347. return NS_OK;
  348. }
  349. NS_IMETHODIMP
  350. LocalCertService::GetOrCreateCert(const nsACString& aNickname,
  351. nsILocalCertGetCallback* aCallback)
  352. {
  353. if (NS_WARN_IF(aNickname.IsEmpty())) {
  354. return NS_ERROR_INVALID_ARG;
  355. }
  356. if (NS_WARN_IF(!aCallback)) {
  357. return NS_ERROR_INVALID_POINTER;
  358. }
  359. // Before sending off the task, login to key slot if needed
  360. nsresult rv = LoginToKeySlot();
  361. if (NS_FAILED(rv)) {
  362. aCallback->HandleCert(nullptr, rv);
  363. return NS_OK;
  364. }
  365. RefPtr<LocalCertGetTask> task(new LocalCertGetTask(aNickname, aCallback));
  366. return task->Dispatch("LocalCertGet");
  367. }
  368. NS_IMETHODIMP
  369. LocalCertService::RemoveCert(const nsACString& aNickname,
  370. nsILocalCertCallback* aCallback)
  371. {
  372. if (NS_WARN_IF(aNickname.IsEmpty())) {
  373. return NS_ERROR_INVALID_ARG;
  374. }
  375. if (NS_WARN_IF(!aCallback)) {
  376. return NS_ERROR_INVALID_POINTER;
  377. }
  378. // Before sending off the task, login to key slot if needed
  379. nsresult rv = LoginToKeySlot();
  380. if (NS_FAILED(rv)) {
  381. aCallback->HandleResult(rv);
  382. return NS_OK;
  383. }
  384. RefPtr<LocalCertRemoveTask> task(
  385. new LocalCertRemoveTask(aNickname, aCallback));
  386. return task->Dispatch("LocalCertRm");
  387. }
  388. NS_IMETHODIMP
  389. LocalCertService::GetLoginPromptRequired(bool* aRequired)
  390. {
  391. nsresult rv;
  392. // Get access to key slot
  393. UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
  394. if (!slot) {
  395. return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
  396. }
  397. // If no user password yet, set it an empty one
  398. if (PK11_NeedUserInit(slot.get())) {
  399. rv = MapSECStatus(PK11_InitPin(slot.get(), "", ""));
  400. if (NS_FAILED(rv)) {
  401. return rv;
  402. }
  403. }
  404. *aRequired = PK11_NeedLogin(slot.get()) &&
  405. !PK11_IsLoggedIn(slot.get(), nullptr);
  406. return NS_OK;
  407. }
  408. #define LOCALCERTSERVICE_CID \
  409. { 0x47402be2, 0xe653, 0x45d0, \
  410. { 0x8d, 0xaa, 0x9f, 0x0d, 0xce, 0x0a, 0xc1, 0x48 } }
  411. NS_GENERIC_FACTORY_CONSTRUCTOR(LocalCertService)
  412. NS_DEFINE_NAMED_CID(LOCALCERTSERVICE_CID);
  413. static const Module::CIDEntry kLocalCertServiceCIDs[] = {
  414. { &kLOCALCERTSERVICE_CID, false, nullptr, LocalCertServiceConstructor },
  415. { nullptr }
  416. };
  417. static const Module::ContractIDEntry kLocalCertServiceContracts[] = {
  418. { LOCALCERTSERVICE_CONTRACTID, &kLOCALCERTSERVICE_CID },
  419. { nullptr }
  420. };
  421. static const Module kLocalCertServiceModule = {
  422. Module::kVersion,
  423. kLocalCertServiceCIDs,
  424. kLocalCertServiceContracts
  425. };
  426. NSMODULE_DEFN(LocalCertServiceModule) = &kLocalCertServiceModule;
  427. } // namespace mozilla